
A brand new disclosed cPanel flaw tracked as CVE-2026-41940 is being mass-exploited to breach web sites and encrypt information in “Sorry” ransomware assaults.
This week, an emergency replace for WHM and cPanel was launched to repair a essential authentication bypass flaw that enables attackers to entry management panels.
WHM and cPanel are Linux-based hosting management panels for server and web site administration. Whereas WHM supplies server-level management, cPanel supplies administrator entry to the web site backend, webmail, and databases.
Quickly after its launch, it was reported that the flaw was being actively exploited within the wild as a zero-day, with exploitation makes an attempt courting again to late February.
Web safety watchdog Shadowserver now experiences that at the very least 44,000 IP addresses working cPanel have since been compromised in ongoing assaults.
cPanel flaw exploited for Sorry ransomware assaults
Quite a few sources informed BleepingComputer that hackers have been exploiting the cPanel flaw since Thursday to breach servers and deploy a Go-based Linux encryptor for the “Sorry” ransomware [VirusTotal].
There have been quite a few experiences of internet sites impacted by the assaults, together with on the BleepingComputer boards, the place a sufferer shared samples of the encrypted information and the contents of the ransom observe.
Since then, widespread exploitation and ransomware assaults have been noticed, with lots of of compromised websites already listed in Google.

Supply: BleepingComputer
The Sorry ransomware encryptor is designed particularly for Linux and can append the “.sorry” extension to all encrypted information.

Supply: diozada on the BleepingComputer boards
BleepingComputer was informed that the ransomware makes use of the ChaCha20 stream cipher to encrypt information, with the encryption key protected utilizing an embedded RSA-2048 public key.
Ransomware professional Rivitna says the one option to decrypt these information is to acquire the corresponding personal RSA-2048 key.
“Decryption is not possible with out an RSA-2048 personal key,” Rivitna posted to our boards.
In every folder, a ransom observe named README.md is created, instructing the sufferer to contact the menace actor on Tox to barter a ransom fee.
The ransom observe is identical for every sufferer of this ransomware marketing campaign, together with the Tox ID “3D7889AEC00F2325E1A3FBC0ACA4E521670497F11E47FDE13EADE8FED3144B5EB56D6B198724,” which is used to contact the menace actor.

Supply: BleepingComputer
It needs to be famous {that a} 2018 ransomware marketing campaign utilized a HiddenTear encryptor to encrypt information and append the .sorry extension. This present marketing campaign makes use of a unique encryptor and is unrelated.
All cPanel and WHM customers are urged to right away set up the accessible safety updates to guard their web sites from ransomware assaults and information theft.
The assaults have simply began, and we’ll seemingly see elevated exploitation over the approaching days and weeks.
AI chained 4 zero-days into one exploit that bypassed each renderer and OS sandboxes. A wave of recent exploits is coming.
On the Autonomous Validation Summit (Could 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls maintain, and closes the remediation loop.

